You can also exclude devices using the Vendor ID or
Device Instance ID assigned to each device.

Applying
Secure USB Settings to Computers

When you apply the Secure USB configuration to both
computers and users, the settings made for computers will be applied before
the settings made for users. For example, assume that you have made the
following settings:

Settings
configured for users

Administrator:
You have unblocked the usage of the disk drive

Other
users (excluding the administrator): You have not deployed any
configurations

Settings
configured for computers : You have blocked the usage of portable
devices and disk drives

The following actions will take place:

Computer startup:
The Secure USB configuration settings made for the computer are applied
when the computer is started. This means that no portable devices
and disk drives can be used.

Administrator
logon: The Secure USB configuration for the computer is applied. However,
it is over written by the settings made for the administrator. This
means that the administrator can use disk drives.

Other users
(excluding the administrator) log on: The Secure USB configuration
made for the computer is applied.

Other users
(excluding the administrator)log off: The log off-action settings
made for users are applied when a user logs off. If the log off-action
setting is set to Don't alter device status, then the settings made
will apply to the next user who logs on, provided that the user does
not have any settings that apply to them.

Note:
Block USB, represents
to block the access to use any USB device.UnblockUSB,
represents to re-enable the access to the USB devices that
has been blocked. No Change, represents
that no change has been made to the current settings.

Adding Restrictions
to secure USB Devices

As an administrator, you can create a configuration
block or unblock specific USB devices. You can also exclude specific devices,
if required.

To create a configuration to secure USB devices for
users, follow the steps given below:

Click the Configurations
tab

Click Configuration

Under Computer
Configurations section click Secure
USB

Enter a name and description
for the configuration

Click Add
to apply restrictions

To add restrictions, select
the devices, choose to block or unblock devices. When you have chosen
to block devices, you can also specify the devices which needs to
be excluded.

You have created configurations to secure USB devices. These configurations
will be applied when the user logs in to the computer.

Excluding Devices

When you block a device
you can exclude certain devices from being blocked. This can be done,
by using Vendor ID or the Device Instance ID assigned to each device.
You can exclude devices only when you have blocked a device. To exclude
devices, follow the steps given below:

Click the Exclude
Devices link against a device

Enter the Device Instance IDfor the device.
You can also choose to block all the devices, from the specified vendor. You will have to specify
the Device Instance ID using which, Desktop Central will fetch the
vendor instance ID and exclude all devices from the specific vendor.

You can choose to exclude
All Encrypted devices/encrypted devices
from the list of specified devices. Devices that are encrypted
using bit locker can be added to the exclusion list. This
is applicable only for Disk Drives and the target computer supports
bit locker.

Click Close

You have excluded a device
from being blocked.

Device Instance
ID

Every USB device has a unique
ID. This ID is assigned to devices by the system to identify them easily.
You can identify the Device Instance ID of a Device by following the steps
mentioned below:

Right-click My
Computer

Click Properties

Click Device
Manager (Refer to the figure below)

From the list of devices,
expand the list of devices for which you want the Device Instance
ID.

(For example : if you want to identify the Device Instance ID of
a mobile phone that you have connected to the computer, expand
portable devices and follow the next step.)

Figure 1: Device Manager

Right-click on the name
of a specific device and click Properties
(Refer to the figure below)

In
computers which have the operating system Windows Vista (and
later versions), the Device Instance ID is called the Device Instance Path. You
can copy the Device Instance Path from the Properties property
sheet of the Device Manager.

In computers that have older versions of the Windows operating
system installed in them, you cannot copy the Device Instance
ID directly from the Properties property sheet of the Device
Manager.

To copy the Device Instance ID you must open the dcusbaccess
log file. This file is located in <Drive>\<Desktopcentral_Agent
Folder>\logs\dcusbaccess.log. It contains information
about the following:

Action Time (inserted\removed time)

Action (inserted\removed)

Friendly name

Device Instance ID

You can now view and
copy the Device Instance ID for a specific device.

Revoking
All USB Restrictions applied to the Computer

Administrators can choose to revoke all USB related restrictions which
are applied to the user.

To create a configuration, in order to revoke all
USB related restrictions for users, follow the steps given below:

You have created configurations to secure USB devices. These configurations
will be applied when the user logs in to the computer.

Note: Administrators
can choose to revoke/remove restrictions applied for specific
USB devices, by clicking "Add" asmentioned in step.5 and choose to unblock the specific
restrictions which needs to be revoked.